Applications of Virtualization to Digital Forensics Education
|
|
- Lucas Hunt
- 8 years ago
- Views:
Transcription
1 Applications of Virtualization to Digital Forensics Education Brian Hay Department of Computer Science University of Alaska Fairbanks Abstract Educators in digital forensics struggle with the desire to provide their students with realistic learning environments while protecting production systems from undesirable and potentially illegal interference. This paper describes methods in which virtualization technology can be used to create realistic learning environments for digital forensics that reduce cost and space requirements while saving students and instructors time. Host-based, network-based, and server-based approaches to virtualization are presented and analyzed. The issues associated with developing an image library for digital forensics are presented as well as the direction of future developments in the field including a vision for sharing virtual environments across institutions. At the recent Colloquium for Information Systems Security (CISSE 2009) approximately 60 attendees participated in virtualization bootcamps and working lunches, and the overwhelming level of interest in the group was determining how to deploy virtualization to provide high quality information assurance, computer security, and digital forensics lab exercises at their institutions. 1. Introduction Computer systems have traditionally consisted of physical desktop and server systems, but this model is rapidly changing to include the embedding of digital technologies in many other arenas, including cell phones, PDAs, digital music players, automobiles, and home automation. In many of these cases the added functionality includes processing capabilities in addition to data storage and network connectivity. As a result of this rapid expansion of computing platforms into non-traditional roles, digital forensics is becoming an increasingly relevant component of investigative efforts, including those conducted by law enforcement, intelligence and military agencies, corporate IT administrators, forensic accountants, and civil litigators. To support the digital forensics data collection and analysis effort there are many tools available, ranging from enterprise level commercial offerings such as Encase and FTK [1], to Linux distributions such as the Helix live CD [6] which includes many forensicallyoriented open-source tools. Although these tools are readily and publicly available, they still require a knowledgeable user to ensure that meaningful and relevant evidence is located and collected, is not corrupted or compromised during the acquisition process, and can be interpreted correctly. The increasing amount of data gathered from each target system, and the increasing number of target systems involved in any investigation means that highly skilled investigators are in short supply, and this is a challenge that the educational system must quickly address. While a strong theoretical background in areas such as file systems and operating systems is an important component of an education in digital forensics, computer science programs are already providing classes that address these needs as part of their undergraduate and graduate curricula. For some applications, particularly those involving the use of an investigation s results in a legal proceeding, a detailed understanding of the process by which data should be collected, stored, transferred, and analyzed is important, although this is an area in which CS programs are generally ill-equipped to provide. The application of theoretical concepts has been shown to be an important factor in ensuring that students fully grasp a subject, in addition a providing practical experience that can allow a student to more easily transition to a real work environment. However, actually providing high quality practical exercises for students is not an easy task. For educators seeking to provide such an experience in digital forensics, there are several goals for the learning environment which can be challenging to attain in the traditional computing lab environments, such as: Creating an interesting scenario at the host level. In the case of a single system, such as a server or workstation, this may involve deploying and configuring an operating /10 $ IEEE 1
2 system, applications, and services/daemons, then seeding the system with applicable and interesting files such as images, documents, and messages. More involved scenarios may include ensuring that forensically relevant data is deleted from the filesystem, or even the installation of rootkits, encryption software, or anti-forensics tools to provide students with a wide range of experiential activities. Creating an interesting network environment. An increasing number of computing devices today have built-in network connectivity, including almost all consumer computing devices, so including a network component in the learning scenarios can be an important addition. Not only do the systems need to be configured to allow network access, but some interesting traffic must also be present on the network, which may require that other systems, such as servers and clients or traffic generators are configured and deployed. Making the exercise available to students. Once the learning environment has been defined, it must be deployed for student use, which may require copies of the relevant systems to be installed on lab workstations. While this process can be simplified using utilities such as Symantec Ghost [11], the process can be time consuming and generally requires administrator intervention (i.e., the students typically can t deploy the system themselves). This also assumes that students are actually physically present, and doesn t provide for students who are involved in distance learning, or who prefer to work on personal workstations with their own suite of tools. Resetting the scenario systems for subsequent groups. At the end of an exercise it is usually necessary to reset the exercise systems to a known state for use in future exercises. Again, systems such as Symantec Ghost can simplify this process, although the previously discussed limitations of such utilities apply in this case too. Production systems, such as lab computers, could technically be used as targets for forensic investigation exercises. While this could potentially simplify the setup phase, the likelihood of sensitive or personal data belonging to lab users being discovered makes this approach at least undesirable, and likely a violation of acceptable use policies or even legal restrictions such as those required for FERPA compliance. Similarly the use of production networks is likely to have undesirable legal implications, even if it only involves students collecting and analyzing production network traffic. More serious problems can occur if any active network scanning is a component of the exercise on a production network, as it is easy for even experienced users to mistakenly target non-exercise systems, which again can have very serious legal implications. In addition to the legal risks, production systems are likely to be too complex to be useful as education exercises for novice students and difficult for the instructor to control the environment. For example, modern hard disks sizes have grown dramatically, making data acquisition more time consuming than is generally possible in a typical class lab session, and networks are likely to have an overwhelming large amount of traffic. This complexity combined with the lack of control that the students and educators encounter make this environment less-than-suitable for digital forensics education. 2. Virtualization Virtualization can be defined as an abstraction layer that decouples the physical hardware from the operating system to deliver greater IT resource utilization and flexibility [13]. Virtualization has long been a feature of high end, multi-processor mainframe systems, allowing multiple copies of the operating system to execute in isolation. However, x86 virtualization has been a more recent development. With multi-processor and multi-core systems and ever larger amounts of RAM and hard disk space becoming commonplace on x86 systems, virtualization on commodity hardware is now a very real, and increasingly mainstream, approach to more fully utilizing x86 desktop and server systems. Not only is virtualization becoming increasingly common, but the virtualization software offerings, which allows multiple virtual machines (VMs) to run concurrently on a single system, are becoming more powerful and user friendly, while simultaneously becoming less expensive, and in many cases are distributed freely. VMware is the current market leader in this arena, and has a wide selection of products, ranging from those targeted towards the home user to enterprise level server virtualization products [14]. In all cases except the enterprise level VMware Infrastructure and recently released vsphere products, VMware software is installed as a program within a host operating system (Windows or Linux). Once the software is installed, one or more guest operating systems can then be installed and executed concurrently, each of which 2
3 functions no differently from the user s perspective than a separate physical system. Supported guest operating systems include many Windows and Linux variants, in addition to other x86 operating systems such as Solaris x86 and BSD versions. VMware offers three free products to the public in addition to their commercial offerings, but for some academic uses all products are offered free of charge through the VMware Academic Program. [12] Xen is a virtualization program which grew out of a research project at Cambridge University. [15] A modified Linux kernel is installed as the virtualization hypervisor, after which other operating systems, known as domains, can be installed. Until recently Xen required that the guest operating system be modified in order to operate as a virtual machine, which made running closed-source operating systems, such as Windows, challenging. Support in Xen 3.x for the virtualization extensions in the latest Intel and AMD processors removed this requirement. While the management tools used with Xen are not as fully developed as those offered by VMware, two major Linux vendors (Red Hat and SUSE) have included Xen as an integral component of their latest enterprise distributions, and the products are being actively developed and improved. Xen is available at no charge, including in source form, and is also supported by a commercial company, XenSource [15]. Kernel-based Virtual Machine (KVM) is another product in the virtualization market, although it is based on the older QEMU [7, 10]. KVM installs as a kernel module on a Linux system, but unlike VMware and Xen, KVM requires the use of Intel or AMD processor virtualization extensions, which currently limits it to relatively new hardware. KVM is now integrated into version 2.6 of the Linux mainline kernel, and while it lacks some advanced functionality, particularly for use in high performance server environments, it is under active development and is likely to be a realistic option in the near future. QEMU, on which KVM is based, is another open source virtualization product, and while it tends to be less user friendly than some of the other products, it has one distinct advantage, namely that it can emulate other processor types, whereas the other products discussed can only run x86 virtual machines. While there are clearly performance implications involved in this emulation, the option to emulate non-x86 processors allows for a much wider range of devices, allowing for exercises involving less-common hardware platforms [10]. Microsoft has provided some basic virtualization software for some time, but those offerings were typically limited with respect to functionality and supported guest operating systems. The host based Virtual PC product is still available, but MS now also offers a true server-based virtualization product, named Hyper-V which may prove to be a serious challenger to VMware vsphere in terms of performance and functionality [8, 9]. 3. Virtual Laboratory Environments Virtualization can be used to address many of the challenges faced by educators attempting to provide their students with high quality digital forensics experience including the following: Creating an interesting scenario at the host level. Although virtualization does not remove the need to create interesting systems, the resulting virtual machines then exist as a small collection of files in a directory on the host system. VMs can be archived or deployed by simply copying the files (or in the enterprise level products through the use of templating and cloning functionality) Creating an interesting network environment. Virtual machines can connect to physical networks in the same manner that physical hosts can, allowing them to participate in exercises based on a physical network. However, multiple VMs running on a physical host can also be connected to a virtual network, allowing realistic networking exercises to be conducted in a completely isolated virtual environment. Making the exercise available to students. Deployment of VMs generally means making a few files available to the physical host. Although the files that comprise the VM can be large (depending on the VM configuration), one or more carefully configured VMs can commonly be stored on a CD or DVD, and made available for use by students anywhere that the associated virtualization software is available. Free software that provides sufficient capabilities for students to run most exercises is available from all of the major vendors. Resetting the exercise systems for subsequent groups. Restoring a known state for a virtual machine requires nothing more than restoring a file, which can either be done manually, or more commonly, can be accomplished in essentially zero time from within the virtualization software. This allows exercises to be configured to one of multiple known states with almost no delay. 3
4 3.1. Host-based Images Over the past 7 years, the University of Alaska Fairbanks (UAF) Advanced System Security Education, Research, and Training (ASSERT) Center [2, 5] has created several evolutionary virtualization lab configurations, based in part on the level of funding that was available and the state of the art in virtualization at the time. Each of these configurations can be used today as feasible roadmap for the deployment of a virtual lab at a given institution, depending on the needs and resources available. The first version involved the deployment of several high performance workstations, each running Microsoft Windows as the host OS, and VMware workstation as the virtualization software. In this version, a single wired network was provided in the lab, and a single basic server, acquired at no charge from the UAF surplus equipment was attached to the network and configured to provide domain (SAMBA) DHCP, DNS, NTP, HTTP, SMTP, and POP service to the workstations and their associated virtual machines. With this configuration, students were able to create and store VMs on the local hard drives on any of the workstations, and the workstations were sufficiently powerful that six VMs could easily be concurrently running on any given workstation, which was sufficient for even the most complex exercises at that time. The lab itself was completely physically isolated from any external network to ensure that no action, either accidental or deliberate, on any of the lab systems was capable of impacting any production host or network. While this architecture did offer many of the benefits associated with the use of virtualization, including the ability to relatively easily restore known configurations and perform exercises in isolated virtual networked environments, there were also several significant drawbacks. The first issue was that students were essentially tied to a specific workstation, as their VM files were too large to easily transfer between machines. As a result, if two students both created VMs on the same workstation, then they could not use the lab environment simultaneously, even if all other workstations were unused. In addition, there was no easy mechanism to allow an instructor to propagate a given VM to all students in the class, other than copying gigabytes of data across a single 100Mb network connection to multiple workstations Network-based Images The next iteration of the lab architecture attempted to address some of the shortcomings of the original version, in that all of the virtual machines were stored on a server. All students were allocated their own space on the server, and their VM directories were mapped onto whatever workstation they chose to login to. This architecture required reorganizing the network so that workstation authentication and VM directory mapping were performed using a dedicated gigabit Ethernet network, whereas the virtual machines were given access to a separate 100Mb Ethernet network, on which the DHCP, DNS, NTP, HTTP, SMTP and POP services were accessible. Using three gigabit connections in a bonded channel for the server connection and gigabit to each workstation proved to provide sufficient bandwidth to support the execution of six VMs per workstation with no noticeable lag time, other than occasionally when several users powered on VMs simultaneously, such as at the start of a lab session. This configuration did solve some of the problems encountered in the initial design, such as the issue of users being tied to a specific workstation. Basic scripts were also written to allow an instructor to copy any of the virtual machines created in an instructor directory to a group of students, which, since all VM files were stored on a single server merely required a copy operation on the server rather than network traffic. The lab network remained completely isolated from any external networks as a protective measure. While this was acceptable initially when class sizes were small, the opportunity to use the lab led to increased interest in courses such as digital forensics, and the physical limitations of the lab became a problem. Students could not use the lab from home, nor could the much larger CS or general use laboratory be used for these exercises as class sizes grew, and this led to scheduling issues and overcrowding Server-based Virtualization The third major iteration of the laboratory environment focused on addressing the need for extra capacity, while ensuring that the VMs have no ability to impact production networks. In this case the execution of the VMs was moved from the user workstations to a rack of servers, each of which was initially running VMware Server. Management of the system was performed using the VMware Virtual Center, which was at that point the only non-free virtualization software component in the lab, and the virtual machines were confined to any of 99 isolated virtual networks, or one of the physically isolated wired networks. Virtual machine files were stored on a 4
5 SAN, attached to each server using a Fibre Channel connection. Users connected to the lab using the freely available Virtual Center client, allowing them to monitor the state of their own VMs, which are manually load balanced across the available servers. They could also perform power actions, such as power on and shutdown from this interface. Users could also connect to the console of any of their virtual machines, allowing them to have the same ability to interact with their VMs as they would having sitting at the keyboard of a physical system. Users could attach to the console of several of their VMs running on the servers. While this console view may appear no different from other remote access methods, such as Remote Data Protocol (RDP) for example, it has one important distinction in that it does not require the VM to have any network connection on the external network, as would be required by RDP or Secure Shell (SSH). Without this capability the VMs would no longer be solely on isolated networks, violating the principle that no VM should be able to impact a production network. 3.4 Server-based Virtualization Using Enterprise Software The VMware Academic Program provided UAF with access to the enterprise level products, including VMware ESX, and in 2007 the ASSERT Lab was transitioned to use VMware Infrastructure (ESX) instead of VMware Server, VMware Infrastructure has some similarity to VMware Server from a cosmetic perspective. However it runs as its own OS, rather than requiring a host operating system such as Linux to be installed as is the case with VMware Server. One limitation in this case is that Infrastructure supports a limited range of server hardware, network cards, and storage devices, but the Infrastructure suite supports many additional capabilities, such as a high performance filesystem specifically tuned to the efficient storage of virtual machines disk files, and automated load balancing of virtual machines between physical servers, even while the VMs are running. As the virtualization field continues to evolve, we are also periodically reassessing the suitability of alternatives to the VMware tools, such as Xen and Hyper-V, to digital forensics education environments. 4. Digital Forensics Image Library developing high quality systems to investigate, whether virtual or physical, is a challenging and time consuming process. However, because virtual machines can be duplicated simply by copying a small set of files, VMs can easily be stored in a central library, and easily shared between educators using a web site, or even mailed CDs and DVDs if necessary. Using this approach, the workload of creating a set of virtual machines which are suitable for digital forensics exercises can be shared across the entire community. UAF has created such a repository, and is populating it with example virtual machines at his time Challenges Related to the Image Library There are at least two major challenges related to building such a library, the first of which relates to the size of the virtual machine files, on which the entire hard disk for the virtual machine is stored. Even the most basic operating system installations require several hundred megabytes of disk storage, and more complex systems could have virtual machine files that are gigabytes in size. In order to deliver these VMs to interested institutions, all of that data must either be delivered across the network, or alternatively mailed on some physical media, such as a DVD. Even using the fast networks commonly found in campus environments, downloading several gigabytes of data can be a time consuming task. The second major challenge relates to software licensing issues. If institution A creates a virtual machine which includes an operating system or software for which they have a valid license, there are many cases where it is at least unclear whether they can then share that VM, even with other institutions who also have licenses for the operating system or software in question. In some cases, such as VMs using some of the freely available Linux operating systems, this does not appear to be an issue, but in other cases, such as those involving the commercial Linux systems like Red Hat Enterprise Linux, or any of the Windows operating systems, the issue of sharing images without violating license agreements is much more problematic. UAF faculty are currently in contact with Microsoft staff in an attempt to address this issue, and while initial interactions have been promising, and there is a general agreement that the ability to share such images would benefit the digital forensics community, no specific solution has yet been agreed upon. Building labs using virtualization solves many of the problems that are faced by digital forensics educators, but it does not directly address the issue that 5
6 4.2. Shared Image Usage The shared digital forensics images available from the online library can not only be used for classroom/lab exercise, but may also have value as reference systems for testing new digital forensics tools. In this manner, new tools could undergo preliminary testing against a set of well defined reference images to gauge their performance. The reference images may also provide a mechanism by which the applicability of tools to different types of digital forensics problems, such as identifying image files or locating encrypted content, could be gauged Shared Scenarios In addition to the VM images files, the online library can also store associated supporting materials, such as a document providing a back-story for the images, or set of images. Such a document may provide environmental information regarding the VM, such as the location of the system or the conditions under which it is being investigated, giving students a richer environment in which to conduct their exercise. Other supporting documents may include worksheets for example exercises that could be conducted using the VM, and even solution sets that describe the relevant information that students should find as part of their investigation Access Restrictions Access to library resources is likely to be restricted to support at least two goals, namely the need to ensure that licenses violations do not occur, and to ensure that students do not gain access to instructor resources. In the event the Microsoft, for example, allows virtual machines using their operating systems to be shared through this library, it is almost certain that institution downloading the VM will still need an existing valid license for Microsoft software, so access to such resources would be restricted to those institutions that had demonstrated their possession of such a license. In addition, some resource, such as the virtual machine files themselves, may be available to students, whereas other components, such as the solution sets may require more restricted access. 5. Future Considerations Although virtualization offers many benefits to academic programs, including digital forensics, there are still some challenges, including the need to administer the virtual server infrastructure, which can be a daunting task in some cases. In addition, while some institutions may be heavy users of digital forensics labs, others may simply include it as a module in a more general CS course, and as a result cannot justify hosting a specialize virtual lab. This situation is extremely similar to the problems successfully address by the supercomputing community, where there are many users of supercomputing resources nationwide, each with different usage requirements, but few institutions with the experience, funding, and expertise necessary to actually run a supercomputing facility. This issue was addressed through the deployment of a small number of NSF funded supercomputing centers throughout the nation, on which researchers and educators could request time for their projects. Such an approach gives nationwide access to supercomputing resources to all who need it, while centralizing the management of the resources themselves. By adopting a similar approach in the digital forensics and information assurance domain, where remotely accessible virtualized labs are stationed in a few institutions with the expertise necessary to manage them, but made available to students and educators nationwide, we can ensure that more institutions can gain access to high quality digital forensics lab experiences. 6. Conclusions Virtualization can provide several advantages to digital forensics educators, and can be applied to provide students with high-quality practical experience with digital forensics topics in a manner which makes efficient use of hardware resources and the time of experts who can share the burden of creating meaningful exercises. In addition, the creation of a remotely accessible virtualized laboratory can allow students to have access to resources from across campus, across the nation, or across the planet, at a time and place that fits their requirements and schedules. As the virtualization field continues to evolve, new tools and approaches are likely to expand the current capabilities leading to better opportunities for virtualization to benefit digital forensics curricula. 7. References [1] AccessData Forensic Toolkit. Retrieved June 14, 2009 from [2] ASSERT Website. Retrieved June 12, 2009 from [3] Computer Laboratory Xen Virtual Machine Monitor, Retrieved June 14, 2009 from 6
7 [4] EnCase Forensic Retrieved June 12, 2009 from [5] Evolution of the ASSERT Computer Security Lab Proceedings of the 10 th Colloquium for Information Systems Security Education. Adelphi, MD. June 6-8, 2006 [6] Helix Website. Retrieved June 12, 2009 from [7] Kernel-based Virtual Machine. Retrieved June 10, 2009 from [8] Microsoft Virtualization: Desktop Virtualization. Retrieved June 10, 2009 from op/default.mspx [9] Microsoft Virtualization: Server Virtualization. Retrieved June 10, 2009 from /default.mspx [10] QEMU. Retrieved June 10, 2009 from [11] Symantec Ghost Solution Suite. Retrieved June 10, 2009 from [12] VMware Academic Program Overview. Retrieved June 10, 2009 from [13] VMware Definition of virtualization. Retrieved June 2, 2009 from [14] VMware: Virtualization, Virtual Machine; Virtual Server Consolidation. Retrieved June 10, 2009 from [15] Citrix Systems: Citrix XenServer: Efficient Virtual Server Software. Retrieved June 10, 2009 from entid=
Evolution of the ASSERT Computer Security Lab
Evolution of the ASSERT Computer Security Lab Brian Hay Kara Nance University of Alaska Fairbanks Agenda n Motivation n Initial Configuration n Virtualization Host Based Images n Virtualization Network
More informationSCO Virtualization Presentation to Customers
SCO Virtualization Presentation to Customers 1 Content Virtualization An Overview Short introduction including key benefits Additional virtualization information from SCO Additional information about Virtualization
More informationRemote PC Guide Series - Volume 1
Introduction and Planning for Remote PC Implementation with NETLAB+ Document Version: 2016-02-01 What is a remote PC and how does it work with NETLAB+? This educational guide will introduce the concepts
More informationIOS110. Virtualization 5/27/2014 1
IOS110 Virtualization 5/27/2014 1 Agenda What is Virtualization? Types of Virtualization. Advantages and Disadvantages. Virtualization software Hyper V What is Virtualization? Virtualization Refers to
More informationOutline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization
Outline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization Duration: Three consecutive Saturdays About this Course This instructor led course teaches students how to implement and manage Windows
More informationThe Do s and Don ts of Server Virtualization Back to basics tips for Australian IT professionals
The Do s and Don ts of Server Virtualization Back to basics tips for Australian IT professionals Virtualization is a well-established in today s IT environments, but it still remains a top priority among
More informationInstalling & Using KVM with Virtual Machine Manager COSC 495
Installing & Using KVM with Virtual Machine Manager COSC 495 1 Abstract:. There are many different hypervisors and virtualization software available for use. One commonly use hypervisor in the Linux system
More informationVirtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies
Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Kurt Klemperer, Principal System Performance Engineer kklemperer@blackboard.com Agenda Session Length:
More informationParallels Server 4 Bare Metal
Parallels Server 4 Bare Metal Product Summary 1/21/2010 Company Overview Parallels is a worldwide leader in virtualization and automation software that optimizes computing for services providers, businesses
More informationImplementing and Managing Windows Server 2008 Hyper-V
Course 6422A: Implementing and Managing Windows Server 2008 Hyper-V Length: 3 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology: Windows Server 2008 Type: Course Delivery Method:
More informationHow To Make A Virtual Machine Aware Of A Network On A Physical Server
VMready Virtual Machine-Aware Networking White Paper Table of Contents Executive Summary... 2 Current Server Virtualization Environments... 3 Hypervisors... 3 Virtual Switches... 3 Leading Server Virtualization
More informationPERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE
PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE Sudha M 1, Harish G M 2, Nandan A 3, Usha J 4 1 Department of MCA, R V College of Engineering, Bangalore : 560059, India sudha.mooki@gmail.com 2 Department
More informationAPPLICATION OF SERVER VIRTUALIZATION IN PLATFORM TESTING
APPLICATION OF SERVER VIRTUALIZATION IN PLATFORM TESTING Application testing remains a complex endeavor as Development and QA managers need to focus on delivering projects on schedule, controlling costs,
More informationComparing Free Virtualization Products
A S P E I T Tr a i n i n g Comparing Free Virtualization Products A WHITE PAPER PREPARED FOR ASPE BY TONY UNGRUHE www.aspe-it.com toll-free: 877-800-5221 Comparing Free Virtualization Products In this
More informationWHITE PAPER 1 WWW.FUSIONIO.COM
1 WWW.FUSIONIO.COM WHITE PAPER WHITE PAPER Executive Summary Fusion iovdi is the first desktop- aware solution to virtual desktop infrastructure. Its software- defined approach uniquely combines the economics
More informationComparing Virtualization Technologies
CHAPTER 2 Comparing Virtualization Technologies With this chapter, we begin our exploration of several popular virtualization strategies and explain how each works. The aim is to bring you the operational
More informationEnabling Technologies for Distributed Computing
Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies
More informationVMware Server 2.0 Essentials. Virtualization Deployment and Management
VMware Server 2.0 Essentials Virtualization Deployment and Management . This PDF is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights reserved.
More informationReplicating and Sharing Computer Security Laboratory Environments
Replicating and Sharing Computer Security Laboratory Environments Kara Nance & Brian Hay Ronald Dodge James Wrubel Steve Burd & Alex Seazzu University of Alaska Fairbanks U.S. Military Academy Carnegie
More informationVirtualization: What does it mean for SAS? Karl Fisher and Clarke Thacher, SAS Institute Inc., Cary, NC
Paper 347-2009 Virtualization: What does it mean for SAS? Karl Fisher and Clarke Thacher, SAS Institute Inc., Cary, NC ABSTRACT SAS groups virtualization into four categories: Hardware Virtualization,
More informationVirtualization. Michael Tsai 2015/06/08
Virtualization Michael Tsai 2015/06/08 What is virtualization? Let s first look at a video from VMware http://bcove.me/x9zhalcl Problems? Low utilization Different needs DNS DHCP Web mail 5% 5% 15% 8%
More informationSNOW LICENSE MANAGER (7.X)... 3
SYSTEM REQUIREMENTS Products Snow License Manager Software Store Option Snow Inventory Server, IDR, IDP Client for Windows Client for Linux Client for Unix Client for OS X Oracle Scanner Snow Integration
More informationVirtualization Technologies. Embrace the new world of healthcare
Virtualization Technologies Embrace the new world of healthcare Overview Introduction and Virtualization Basics Core Virtualization Technologies Enterprise Server Virtualization Solutions End User and
More informationPC Blade Virtualization Configuration Guide
PC Blade Virtualization Configuration Guide The combination of ClearCube PC Blades and management software with industry-standard virtualization technology gives IT managers a new way to more efficiently
More informationnanohub.org An Overview of Virtualization Techniques
An Overview of Virtualization Techniques Renato Figueiredo Advanced Computing and Information Systems (ACIS) Electrical and Computer Engineering University of Florida NCN/NMI Team 2/3/2006 1 Outline Resource
More informationCloud Computing for Control Systems CERN Openlab Summer Student Program 9/9/2011 ARSALAAN AHMED SHAIKH
Cloud Computing for Control Systems CERN Openlab Summer Student Program 9/9/2011 ARSALAAN AHMED SHAIKH CONTENTS Introduction... 4 System Components... 4 OpenNebula Cloud Management Toolkit... 4 VMware
More informationExpert Reference Series of White Papers. VMware vsphere Essentials
Expert Reference Series of White Papers VMware vsphere Essentials 1-800-COURSES www.globalknowledge.com VMware vsphere Essentials Raj Tolani, Global Knowledge Instructor Introduction Every VMware class
More informationSymantec Backup Exec.cloud
Automatic, continuous, and secure protection that backs up data to the cloud, or via a hybrid approach combining on-premise and cloud-based backup. Data Sheet: Symantec.cloud Only 21 percent of SMBs are
More informationRED HAT ENTERPRISE VIRTUALIZATION
Giuseppe Paterno' Solution Architect Jan 2010 Red Hat Milestones October 1994 Red Hat Linux June 2004 Red Hat Global File System August 2005 Red Hat Certificate System & Dir. Server April 2006 JBoss April
More informationTable of Contents. Server Virtualization Peer Review 01-03-2007 cameron 1-24-2007: modified, cameron
Table of Contents Objective...2 Definitions...2 Objective discussion...2 Comparison criteria...3 Criteria weights...4 Product scores...4 Criteria comparison discussion...5 References...7 Cost Estimate,
More informationEnabling Technologies for Distributed and Cloud Computing
Enabling Technologies for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Multi-core CPUs and Multithreading
More informationVirtualization: Know your options on Ubuntu. Nick Barcet. Ubuntu Server Product Manager nick.barcet@canonical.com
Virtualization: Know your options on Ubuntu Nick Barcet Ubuntu Server Product Manager nick.barcet@canonical.com Agenda Defi nitions Host virtualization tools Desktop virtualization tools Ubuntu as a guest
More informationWith Red Hat Enterprise Virtualization, you can: Take advantage of existing people skills and investments
RED HAT ENTERPRISE VIRTUALIZATION DATASHEET RED HAT ENTERPRISE VIRTUALIZATION AT A GLANCE Provides a complete end-toend enterprise virtualization solution for servers and desktop Provides an on-ramp to
More informationNetworking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g Virtualization: Architectural Considerations and Implementation Options Virtualization Virtualization is the
More informationEnsure that the server where you install the Primary Server software meets the following requirements: Item Requirements Additional Details
ZENworks 11 SP3 System December 2014 The following sections provide the Novell ZENworks 11 SP3 requirements for hardware and software: Section 1, Primary Server, on page 1 Section 2, Managed Device, on
More informationRed Hat Enterprise Linux as a
Red Hat Enterprise Linux as a file server You re familiar with Red Hat products that provide general-purpose environments for server-based software applications or desktop/workstation users. But did you
More informationEvaluating the Balabit Shell Control Box
Evaluating the Balabit Shell Control Box November 17, 2015 Copyright 1996-2015 Balabit SA Table of Contents 1. Evaluating Balabit Shell Control Box in a virtual environment... 3 1.1. Limitations... 3 1.2.
More informationSNOW LICENSE MANAGER (7.X)... 3
SYSTEM REQUIREMENTS Products Snow License Manager Snow Inventory Server, IDR, IDP Client for Windows Client for Linux Client for Unix Client for OS X Oracle Scanner External Data Provider Snow Distribution
More informationServervirualisierung mit Citrix XenServer
Servervirualisierung mit Citrix XenServer Paul Murray, Senior Systems Engineer, MSG EMEA Citrix Systems International GmbH paul.murray@eu.citrix.com Virtualization Wave is Just Beginning Only 6% of x86
More informationCPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers
CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies Lecture 4 Virtualization of Clusters and Data Centers Text Book: Distributed and Cloud Computing, by K. Hwang, G C. Fox, and J.J. Dongarra,
More informationSimplifying Server Workload Migrations
Simplifying Server Workload Migrations This document describes the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual
More informationGetting Started with ESXi Embedded
ESXi 4.1 Embedded vcenter Server 4.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent
More informationThe XenServer Product Family:
The XenServer Product Family: A XenSource TM White Paper Virtualization Choice for Every Server: The Next Generation of Server Virtualization The business case for virtualization is based on an industry-wide
More informationInternational Journal of Advancements in Research & Technology, Volume 1, Issue6, November-2012 1 ISSN 2278-7763
International Journal of Advancements in Research & Technology, Volume 1, Issue6, November-2012 1 VIRTUALIZATION Vikas Garg Abstract: The main aim of the research was to get the knowledge of present trends
More informationThe Business Case Migration to Windows Server 2012 R2 with Lenovo Servers
The Business Case Migration to Windows Server 2012 R2 with Lenovo Servers New levels of integration and capabilities provide the foundation for building more successful businesses with this new infrastructure
More informationHypervisor Software and Virtual Machines. Professor Howard Burpee SMCC Computer Technology Dept.
Hypervisor Software and Virtual Machines Learning Objectives Understand the common features of today s desktop virtualization products Select and implement a desktop virtualization option on a Linux, Mac,
More informationJOB ORIENTED VMWARE TRAINING INSTITUTE IN CHENNAI
JOB ORIENTED VMWARE TRAINING INSTITUTE IN CHENNAI Job oriented VMWARE training is offered by Peridot Systems in Chennai. Training in our institute gives you strong foundation on cloud computing by incrementing
More informationImplementing Cisco Data Center Unified Computing (DCUCI)
Certification CCNP Data Center Implementing Cisco Data Center Unified Computing (DCUCI) 5 days Implementing Cisco Data Center Unified Computing (DCUCI) is designed to serve the needs of engineers who implement
More informationRecent Advances in Applied & Biomedical Informatics and Computational Engineering in Systems Applications
Comparison of Technologies for Software ization PETR SUBA, JOSEF HORALEK, MARTIN HATAS Faculty of Informatics and Management, University of Hradec Králové, Rokitanského 62, 500 03 Hradec Kralove Czech
More informationSection 1.0 Co-location and Virtual Machines
ITS Co-location and Virtual Machine Customer Questionnaire This form is for both Co-locations and Virtual Machines. If you are requesting a Virtual Machine, answer sections 1 and 3 of this questionnaire
More informationIntro to Virtualization
Cloud@Ceid Seminars Intro to Virtualization Christos Alexakos Computer Engineer, MSc, PhD C. Sysadmin at Pattern Recognition Lab 1 st Seminar 19/3/2014 Contents What is virtualization How it works Hypervisor
More informationLICENSING MANAGEMENT SERIES. A Guide to Assessing Windows Server Licensing
LICENSING MANAGEMENT SERIES A Guide to Assessing Windows Server Licensing July 2010 This document provides customers of Windows Server 2003, Windows Server 2003 R2, Windows Server 2008, and Windows Server
More informationVirtualization and Disaster Recovery
Virtualization and Disaster Recovery Ray Trygstad Director of Information Technology, Associate Director, Information Technology & Management Degrees Illinois Institute of Technology NetSecure 09 March
More informationVirtualization and Cloud Management Using Capacity Planning
Research Report Virtualization and Cloud Management Using Capacity Planning Introduction The term virtualization refers to the creation of virtual machines, virtual networks and virtual disks (logical
More informationVirtualization 101 ASPE RESOURCE SERIES. Prepared for ASPE by Global Knowledge's Kerry Doyle, MA, ZDNet/CNet.com Associate Editor
ASPE RESOURCE SERIES Virtualization 101 Prepared for ASPE by Global Knowledge's Kerry Doyle, MA, ZDNet/CNet.com Associate Editor Real Skills. Real Results. Real IT. in partnership with Virtualization 101
More informationRally Installation Guide
Rally Installation Guide Rally On-Premises release 2015.1 rallysupport@rallydev.com www.rallydev.com Version 2015.1 Table of Contents Overview... 3 Server requirements... 3 Browser requirements... 3 Access
More informationTechTarget Windows Media
TechTarget Windows Media SearchWinIT.com SearchExchange.com SearchSQLServer.com SearchEnterpriseDesktop.com SearchWindowsServer.com SearchDomino.com LabMice.net E-Guide Hyper-V: What you need to know before
More informationVMware/Hyper-V Backup Plug-in User Guide
VMware/Hyper-V Backup Plug-in User Guide COPYRIGHT No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying,
More informationOutgoing VDI Gateways:
` Outgoing VDI Gateways: Creating a Unified Outgoing Virtual Desktop Infrastructure with Windows Server 2008 R2 and ObserveIT Daniel Petri January 2010 Copyright 2010 ObserveIT Ltd. 2 Table of Contents
More informationVirtualization. Jukka K. Nurminen 23.9.2015
Virtualization Jukka K. Nurminen 23.9.2015 Virtualization Virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms,
More informationIssues in Information Systems Volume 16, Issue I, pp. 219-225, 2015
MOVING TOWARD A SERVER-BASED VIRTUAL MACHINE HOSTING ENVIRONMENT IN SUPPORT OF UNIVERSITY INFORMATION TECHNOLOGY PROGRAMMING COURSES George Stefanek, PhD, Purdue University North Central, stefanek@pnc.edu
More informationBest Practices for Installing and Configuring the Hyper-V Role on the LSI CTS2600 Storage System for Windows 2008
Best Practices Best Practices for Installing and Configuring the Hyper-V Role on the LSI CTS2600 Storage System for Windows 2008 Installation and Configuration Guide 2010 LSI Corporation August 13, 2010
More informationVirtualization for Cloud Computing
Virtualization for Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF CLOUD COMPUTING On demand provision of computational resources
More informationDistributed systems Techs 4. Virtualization. October 26, 2009
Distributed systems Techs 4. Virtualization October 26, 2009 Current interest in virtualization is one of the hottest topics in information technology today. Possible due to the increasing speed and capabilities
More informationVIRTUALIZATION IS IT RIGHT FOR YOU? Author: David Burford LAD ENTERPRIZES, INC. www.ladenterprizes.com 610-429-3122. August 2008
VIRTUALIZATION IS IT RIGHT FOR YOU? LAD ENTERPRIZES, INC. www.ladenterprizes.com 610-429-3122 August 2008 Author: David Burford Virtualization I S I T R I G H T F O R Y O U? R ecently the technical vendor
More informationRedefining Microsoft SQL Server Data Management. PAS Specification
Redefining Microsoft SQL Server Data Management APRIL Actifio 11, 2013 PAS Specification Table of Contents Introduction.... 3 Background.... 3 Virtualizing Microsoft SQL Server Data Management.... 4 Virtualizing
More informationVirtualization. Types of Interfaces
Virtualization Virtualization: extend or replace an existing interface to mimic the behavior of another system. Introduced in 1970s: run legacy software on newer mainframe hardware Handle platform diversity
More informationSelecting the Right NAS File Server
Selecting the Right NAS File Server As the network administrator for a workgroup LAN, consider this scenario: once again, one of your network file servers is running out of storage space. You send out
More informationIn order to upload a VM you need to have a VM image in one of the following formats:
What is VM Upload? 1. VM Upload allows you to import your own VM and add it to your environment running on CloudShare. This provides a convenient way to upload VMs and appliances which were already built.
More informationSimplifying Storage Operations By David Strom (published 3.15 by VMware) Introduction
Simplifying Storage Operations By David Strom (published 3.15 by VMware) Introduction There are tectonic changes to storage technology that the IT industry hasn t seen for many years. Storage has been
More informationvnas Series All-in-one NAS with virtualization platform 2014.01.03
vnas Series All-in-one NAS with virtualization platform 2014.01.03 2 Imaging NAS Virtualization Station VMware ESX 3 Install Virtualization Station on a specialized Turbo NAS VM vnas Use vnas series to
More informationProtecting your Data in a New Generation Virtual and Physical Environment
Protecting your Data in a New Generation Virtual and Physical Environment Read this white paper to learn how you can easily and safely protect your data in a new generation virtual and physical IT environment,
More informationCA ARCserve Family r15
CA ARCserve Family r15 Rami Nasser EMEA Principal Consultant, Technical Sales Rami.Nasser@ca.com The ARCserve Family More than Backup The only solution that: Gives customers control over their changing
More informationVirtualization & Cloud Computing (2W-VnCC)
Virtualization & Cloud Computing (2W-VnCC) DETAILS OF THE SYLLABUS: Basics of Networking Types of Networking Networking Tools Basics of IP Addressing Subnet Mask & Subnetting MAC Address Ports : Physical
More informationAcronis Backup & Recovery 11.5
Acronis Backup & Recovery 11.5 Update 2 Installation Guide Applies to the following editions: Advanced Server Server for Windows Virtual Edition Server for Linux Advanced Server SBS Edition Workstation
More informationSolution Overview. Business Continuity with ReadyNAS
Business Continuity with ReadyNAS What is ReadyNAS? ReadyNAS is a family of network storage solutions for small and medium businesses, workgroups, and remote/home offices. ReadyNAS delivers unified storage
More informationBusiness Continuity Management BCM. Welcome to the Matrix The Future of Server Virtualization
Business Continuity Management BCM Welcome to the Matrix The Future of Server Virtualization Topics Introduction Overview of Virtualization VMWare Functionality Virtualization DR Strategies Virtualization
More informationDefinitions. Hardware Full virtualization Para virtualization Hosted hypervisor Type I hypervisor. Native (bare metal) hypervisor Type II hypervisor
Virtualization Objectives Definitions Why Problems Versions Virtualization vs Cloud Creating a New Virtual Machine Working with a Virtual Machine Virtual Machine Settings Virtual Machine Snapshots Definitions
More informationHP Data Protector software. Assuring Business Continuity in Virtualised Environments
HP Data Protector software Assuring Business Continuity in Virtualised Environments Would not it be great if your virtual server environment actually translated to a better reality? One where you could
More informationXen Virtualization: Xen (source) and XenServer
Xen Virtualization: Xen (source) and XenServer An introduction to free and commercial methods of creating virtual servers by Mark Sallee, Sys Admin, NCAR " Why Virtualization? Scenario: imagine that you
More informationExpert tips for realizing maximum private cloud benefits
E-Guide Expert tips for realizing maximum private cloud benefits Today s enterprises either already have a private cloud, plan to build one or at least have considered in-house cloud as an option. But
More informationServer and Storage Virtualization. Virtualization. Overview. 5 Reasons to Virtualize
Server and Storage Virtualization. Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides and audio/video recordings of this class lecture are at:
More informationOverview... 2. Customer Login... 2. Main Page... 2. VM Management... 4. Creation... 4 Editing a Virtual Machine... 6
July 2013 Contents Overview... 2 Customer Login... 2 Main Page... 2 VM Management... 4 Creation... 4 Editing a Virtual Machine... 6 Disk Management... 7 Deletion... 7 Power On / Off... 8 Network Management...
More informationSage 100 Standard ERP Version 2013 Supported Platform Matrix Created as of November 21, 2013
Sage 100 Standard ERP Version 2013 The information in this document applies to Sage 100 Standard ERP Version 2013 1. Detailed product update information and support policies can be found on the Sage Online
More informationMigrating to ESXi: How To
ILTA Webinar Session Migrating to ESXi: How To Strategies, Procedures & Precautions Server Operations and Security Technology Speaker: Christopher Janoch December 29, 2010 Migrating to ESXi: How To Strategies,
More informationGRAVITYZONE HERE. Deployment Guide VLE Environment
GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
More informationBest Practices for VMware ESX Server 2
Best Practices for VMware ESX Server 2 2 Summary VMware ESX Server can be deployed in many ways. In this document, we recommend specific deployment guidelines. Following these guidelines will maximize
More informationMore Efficient Virtualization Management: Templates
White Paper More Efficient Virtualization Management: Templates Learn more at www.swsoft.com/virtuozzo Published: November 2006 Revised: November 2006 Table of Contents Table of Contents... 2 OS, Middleware
More informationTerminal Server Software and Hardware Requirements. Terminal Server. Software and Hardware Requirements. Datacolor Match Pigment Datacolor Tools
Terminal Server Software and Hardware Requirements Datacolor Match Pigment Datacolor Tools January 21, 2011 Page 1 of 8 Introduction This document will provide preliminary information about the both the
More information2) Xen Hypervisor 3) UEC
5. Implementation Implementation of the trust model requires first preparing a test bed. It is a cloud computing environment that is required as the first step towards the implementation. Various tools
More informationProfessional Xen Visualization
Professional Xen Visualization William von Hagen WILEY Wiley Publishing, Inc. Acknowledgments Introduction ix xix Chapter 1: Overview of Virtualization : 1 What Is Virtualization? 2 Application Virtualization
More informationCourse 6331A: Deploying and Managing Microsoft System Center Virtual Machine Manager
Course 6331A: Deploying and Managing Microsoft System Center Virtual Machine Manager Length: 3 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology: Microsoft System Center Virtual
More informationDell Compellent Storage Center SAN & VMware View 1,000 Desktop Reference Architecture. Dell Compellent Product Specialist Team
Dell Compellent Storage Center SAN & VMware View 1,000 Desktop Reference Architecture Dell Compellent Product Specialist Team THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL
More informationVirtualised MikroTik
Virtualised MikroTik MikroTik in a Virtualised Hardware Environment Speaker: Tom Smyth CTO Wireless Connect Ltd. Event: MUM Krackow Feb 2008 http://wirelessconnect.eu/ Copyright 2008 1 Objectives Understand
More informationIncreasing Storage Performance, Reducing Cost and Simplifying Management for VDI Deployments
Increasing Storage Performance, Reducing Cost and Simplifying Management for VDI Deployments Table of Contents Introduction.......................................3 Benefits of VDI.....................................4
More informationVMware Virtual Infrastucture From the Virtualized to the Automated Data Center
VMware Virtual Infrastucture From the Virtualized to the Automated Data Center Senior System Engineer VMware Inc. ngalante@vmware.com Agenda Vision VMware Enables Datacenter Automation VMware Solutions
More informationBalancing CPU, Storage
TechTarget Data Center Media E-Guide Server Virtualization: Balancing CPU, Storage and Networking Demands Virtualization initiatives often become a balancing act for data center administrators, who are
More informationRED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES
RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS Server virtualization offers tremendous benefits for enterprise IT organizations server
More informationDeployment Options for Microsoft Hyper-V Server
CA ARCserve Replication and CA ARCserve High Availability r16 CA ARCserve Replication and CA ARCserve High Availability Deployment Options for Microsoft Hyper-V Server TYPICALLY, IT COST REDUCTION INITIATIVES
More informationEfficient Load Balancing using VM Migration by QEMU-KVM
International Journal of Computer Science and Telecommunications [Volume 5, Issue 8, August 2014] 49 ISSN 2047-3338 Efficient Load Balancing using VM Migration by QEMU-KVM Sharang Telkikar 1, Shreyas Talele
More information